Analysis

  • max time kernel
    146s
  • max time network
    193s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2022 05:51

General

  • Target

    f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe

  • Size

    208KB

  • MD5

    d8e0bd15e2bbcb5aadb7ae81f682d7df

  • SHA1

    098a9b774d90a0572cbf26985ff8a5e5ebd7dd2c

  • SHA256

    f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4

  • SHA512

    6ce8c8699c1afd4b59cafb11e92ba02971a490859c4308c835f17bc8253d52de2e385357580e4c05958f84628b559277e899dc87e42626bf0a62c157c5ad653d

  • SSDEEP

    3072:WDPrP0+IfBxULK6ur4AKKV6AopNgyci0phK0jnboVDcu38Xi+1ffsvaspDZc:gz0+uAKz4AKKSYg0jU9cOI3hA

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe
    "C:\Users\Admin\AppData\Local\Temp\f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1280

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    208KB

    MD5

    11e65feca8bfdd4f08a269f3af10b81c

    SHA1

    642d71017b1bb0a4aa7d0b0c0b0e755d1cdb525f

    SHA256

    66cd22d99c82bbfb158859857173b275b1468985c4e9b73a78bded83403b485a

    SHA512

    01f081bf53a9f6d37e8d335441e25ad357395ee0fedb7c4139b24aba4334df7550ef2d5387b04b071ff3e6caa12582026422b7fede3043833f21d9469c708013

  • C:\Windows\apppatch\svchost.exe

    Filesize

    208KB

    MD5

    11e65feca8bfdd4f08a269f3af10b81c

    SHA1

    642d71017b1bb0a4aa7d0b0c0b0e755d1cdb525f

    SHA256

    66cd22d99c82bbfb158859857173b275b1468985c4e9b73a78bded83403b485a

    SHA512

    01f081bf53a9f6d37e8d335441e25ad357395ee0fedb7c4139b24aba4334df7550ef2d5387b04b071ff3e6caa12582026422b7fede3043833f21d9469c708013

  • \Windows\AppPatch\svchost.exe

    Filesize

    208KB

    MD5

    11e65feca8bfdd4f08a269f3af10b81c

    SHA1

    642d71017b1bb0a4aa7d0b0c0b0e755d1cdb525f

    SHA256

    66cd22d99c82bbfb158859857173b275b1468985c4e9b73a78bded83403b485a

    SHA512

    01f081bf53a9f6d37e8d335441e25ad357395ee0fedb7c4139b24aba4334df7550ef2d5387b04b071ff3e6caa12582026422b7fede3043833f21d9469c708013

  • \Windows\AppPatch\svchost.exe

    Filesize

    208KB

    MD5

    11e65feca8bfdd4f08a269f3af10b81c

    SHA1

    642d71017b1bb0a4aa7d0b0c0b0e755d1cdb525f

    SHA256

    66cd22d99c82bbfb158859857173b275b1468985c4e9b73a78bded83403b485a

    SHA512

    01f081bf53a9f6d37e8d335441e25ad357395ee0fedb7c4139b24aba4334df7550ef2d5387b04b071ff3e6caa12582026422b7fede3043833f21d9469c708013

  • memory/872-62-0x00000000002F0000-0x0000000000342000-memory.dmp

    Filesize

    328KB

  • memory/872-54-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/872-56-0x00000000759C1000-0x00000000759C3000-memory.dmp

    Filesize

    8KB

  • memory/872-55-0x00000000002F0000-0x0000000000342000-memory.dmp

    Filesize

    328KB

  • memory/872-57-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/872-64-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1280-68-0x0000000002250000-0x00000000022FA000-memory.dmp

    Filesize

    680KB

  • memory/1280-66-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1280-67-0x0000000002250000-0x00000000022FA000-memory.dmp

    Filesize

    680KB

  • memory/1280-63-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1280-69-0x0000000002250000-0x00000000022FA000-memory.dmp

    Filesize

    680KB

  • memory/1280-71-0x0000000002250000-0x00000000022FA000-memory.dmp

    Filesize

    680KB

  • memory/1280-72-0x0000000002250000-0x00000000022FA000-memory.dmp

    Filesize

    680KB

  • memory/1280-74-0x0000000002250000-0x00000000022FA000-memory.dmp

    Filesize

    680KB

  • memory/1280-76-0x0000000002400000-0x00000000024B7000-memory.dmp

    Filesize

    732KB

  • memory/1280-77-0x0000000000400000-0x000000000048C000-memory.dmp

    Filesize

    560KB

  • memory/1280-78-0x0000000002400000-0x00000000024B7000-memory.dmp

    Filesize

    732KB